A Survey of Worldwide Censorship Techniques

The information below is for an old version of the document
Document Type Expired Internet-Draft (pearg RG)
Authors Joseph Hall  , Michael Aaron  , Stan Adams  , Ben Jones  , Nick Feamster 
Last updated 2020-02-24 (latest revision 2019-08-23)
Replaces draft-hall-censorship-tech
Stream Internet Research Task Force (IRTF)
Expired & archived
plain text xml htmlized pdfized bibtex
Stream IRTF state (None)
Consensus Boilerplate Unknown
Document shepherd No shepherd assigned
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


This document describes the technical mechanisms used by censorship regimes around the world to block or impair Internet traffic. It aims to make designers, implementers, and users of Internet protocols aware of the properties being exploited and mechanisms used to censor end-user access to information. This document makes no suggestions on individual protocol considerations, and is purely informational, intended to be a reference.


Joseph Hall (joe@cdt.org)
Michael Aaron (michael.aaron@colorado.edu)
Stan Adams (sadams@cdt.org)
Ben Jones (bj6@cs.princeton.edu)
Nick Feamster (feamster@cs.princeton.edu)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)